skip to main content
10.1145/1161289.1161306acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
Article

SCUBA: Secure Code Update By Attestation in sensor networks

Published: 28 September 2006 Publication History

Abstract

This paper presents SCUBA (Secure Code Update By Attestation), for detecting and recovering compromised nodes in sensor networks. The SCUBA protocol enables the design of a sensor network that can detect compromised nodes without false negatives, and either repair them through code updates, or revoke the compromised nodes. The SCUBA protocol represents a promising approach for designing secure sensor networks by proposing a first approach for automatic recovery of compromised sensor nodes. The SCUBA protocol is based on ICE (Indisputable Code Execution), a primitive we introduce to dynamically establish a trusted code base on a remote, untrusted sensor node.

References

[1]
R. Anderson. F. Bergadano, B. Crispo, J. Lee, C. M anifavas, and R. Needham. A new family of authentication protocols. ACM Operating Systems Review, 32(4):9--20, October 1998.]]
[2]
A. Seshadri, M. Luk, A. Perrig, L. van Doorn, and P. Khosla. Using FIRE and ICE for detecting and recovering compromised nodes in sensor networks. Technical Report CMU-CS-04-187, School of Computer Science, Carnegie Mellon University, December 2004.]]
[3]
M. Bellare, R. Canetti, and H. Krawczyk. Keying hash functions for message authentication. In Advances in Cryptology - Crypto, pages 1--15, 1996.]]
[4]
J. Deng, R. Han, and S. Mishra. Secure code distribution in dynamically programmable wireless sensor networks. In Proceedings in International Conference on Information Processing in Sensor Networks (IPSN 2006), 2006.]]
[5]
J. Douceur. The Sybil attack. In Proceedings of Workshop on Peer-to-Peer Systems (IPTPS), March 2002.]]
[6]
D. Spinellis. Reflection as a mechanism for software integrity verification. ACM Transactions on Information and System Security, 3(1):51--62, February 2000.]]
[7]
P. Dutta, J. Hui, D. Chu, and D. Culler. Securing the deluge network programming system. In Proceedings in International Conference on Information Processing in Sensor Networks (IPSN), 2006.]]
[8]
Free Software Foundation. superopt - finds the shortest instruction sequence for a given function. http://www.gnu.org/directory/devel/compilers/superopt.html.]]
[9]
J. Hui and D. Culler. The dynamic behavior of a data dissemination protocol for network programming at scale. In Proceedings of ACM Conference on Embedded Networked Sensor Systems (SenSys), November 2004.]]
[10]
R. Joshi, G. Nelson, and K. Randall. Denali: a goal-directed superoptimizer. In Proceedings of ACM Conference on Programming Language Design and Implementation (PLDI), pages 304--314, 2002.]]
[11]
R. Kennell and L. Jamieson. Establishing the genuinity of remote computer systems. In Proceedings of USENIX Security Symposium, August 2003.]]
[12]
A. Klimov and A. Shamir. New cryptographic primitives based on multiword t-functions. In Fast Software Encryption, February 2004.]]
[13]
P. Levis. S. Madden, D. Gay, J. Polastre, R. Szewczyk, A. Woo, E. Brewer, and D. Culler. The emergence of networking abstractions and techniques in TinyOS. In Proceedings of Symposium on Networked Systems Design and Implementation (NSDI), March 2004.]]
[14]
P. Levis, N. Patel, D. Culler, and S. Shenker. Trickle: A self-regulating algorithm for code propagation and maintenance in wireless sensor networks. In Proceedings of Symposium on Networked Systems Design and Implementation (NSDI), March 2004.]]
[15]
D. Malan, M. Welsh, and M. Smith. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography. In Proceedings of IEEE Conference on Sensor and Ad hoc Communications and Networks (SECON), October 2004.]]
[16]
Moteiv Corp. Tmote Sky: Low Power Wireless Sensor Module, June 2006.]]
[17]
M. Shaneck, K. Mahadevan, V. Kher, and Y. Kim. Remote software-based attestation for wireless sensors. In ESAS, pages 27--41. 2005.]]
[18]
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. SPINS: Security protocols for sensor networks. In Proceedings of Conference on Mobile Computing and Networks (MobiCom), July 2001.]]
[19]
A. Seshadri, A. Perrig, L. van Doom, and P. Khosla. SWATT: Software-based attestation for embedded devices. In Proceedings of the IEEE Symposium on Security and Privacy, May 2004.]]
[20]
Arvind Seshadri, Mark Luk, Elaine Shi, Adrian Perrig, Leendert van Doom, and Pradeep Khosla. Pioneer: Verifying integrity and guaranteeing execution of code on legacy platforms. In Proceedings of ACM Symposium on Operating Systems Principles (SOSP), pages 1--15, October 2005.]]
[21]
T. Stathopoulos, J. Heidemann, and D. Estrin. A remote code update mechanism for wireless sensor networks. Technical Report CENS-TR-30, UCLA-CENS, November 2003.]]
[22]
T. Park and K. Shin. Soft tamper-proofing via program integrity verification in wireless sensor networks. IEEE Transactions on Mobile Computing, 4(3), May/June 2005.]]
[23]
C. Y. Wan, A. T. Campbell, and L. Krishnamurthy. PSFQ: A reliable transport protocol for wireless sensor networks. In Proceedings of ACM Workshop on Wireless Sensor Networks and Applications (WSNA), September 2002.]]

Cited By

View all
  • (2024)Blockchain Handshaking with Software Assurance: Version++ Protocol for Bitcoin CryptocurrencyElectronics10.3390/electronics1319385713:19(3857)Online publication date: 29-Sep-2024
  • (2024)A Software Integrity Authentication Protocol for Zero Trust ArchitectureProceedings of the SIGCOMM Workshop on Zero Trust Architecture for Next Generation Communications10.1145/3672200.3673874(1-6)Online publication date: 4-Aug-2024
  • (2024)An Intelligent Fingerprinting Technique for Low-Power Embedded IoT DevicesIEEE Transactions on Artificial Intelligence10.1109/TAI.2024.33864985:9(4519-4534)Online publication date: Sep-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
WiSe '06: Proceedings of the 5th ACM workshop on Wireless security
September 2006
115 pages
ISBN:1595935576
DOI:10.1145/1161289
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 28 September 2006

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. externally-verifiable code execution
  2. secure code update
  3. self-checksumming code
  4. software-based attestation

Qualifiers

  • Article

Conference

DIWANS06
Sponsor:

Acceptance Rates

Overall Acceptance Rate 10 of 41 submissions, 24%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)24
  • Downloads (Last 6 weeks)0
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Blockchain Handshaking with Software Assurance: Version++ Protocol for Bitcoin CryptocurrencyElectronics10.3390/electronics1319385713:19(3857)Online publication date: 29-Sep-2024
  • (2024)A Software Integrity Authentication Protocol for Zero Trust ArchitectureProceedings of the SIGCOMM Workshop on Zero Trust Architecture for Next Generation Communications10.1145/3672200.3673874(1-6)Online publication date: 4-Aug-2024
  • (2024)An Intelligent Fingerprinting Technique for Low-Power Embedded IoT DevicesIEEE Transactions on Artificial Intelligence10.1109/TAI.2024.33864985:9(4519-4534)Online publication date: Sep-2024
  • (2024)One for All and All for One: GNN-based Control-Flow Attestation for Embedded Devices2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00251(3346-3364)Online publication date: 19-May-2024
  • (2024)RAM-Based Firmware Attestation for IoT Security: A Representation Learning FrameworkIEEE Internet of Things Journal10.1109/JIOT.2024.343605711:21(35124-35140)Online publication date: 1-Nov-2024
  • (2024)Revisiting Multi-Factor Authentication Token Cybersecurity: A TLS Identity Module Use Case2024 International Conference on Computing, Networking and Communications (ICNC)10.1109/ICNC59896.2024.10556005(33-38)Online publication date: 19-Feb-2024
  • (2024)Remote Attestation with Software Updates in Embedded Systems2024 IEEE Conference on Communications and Network Security (CNS)10.1109/CNS62487.2024.10735526(1-6)Online publication date: 30-Sep-2024
  • (2024)SAFE-IoT: Attesting Firmware in IoT Swarms using Volatile Memory and a Mixture of Experts2024 IEEE Conference on Communications and Network Security (CNS)10.1109/CNS62487.2024.10735468(1-9)Online publication date: 30-Sep-2024
  • (2024)A Hardware-Based Correct Execution Environment Supporting Virtual MemoryIEEE Access10.1109/ACCESS.2024.344350912(114008-114022)Online publication date: 2024
  • (2023)AI-Powered Security for IoT: A Blockchain Enabled Device Twin ApproachOnline Identity - An Essential Guide [Working Title]10.5772/intechopen.1003003Online publication date: 8-Dec-2023
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media